X2Go Bug report logs - #1119
Fwd: [Bug 1399281] [abrt] x2goclient: privatekey_from_file(): x2goclient killed by SIGSEGV

version graph

Package: x2goclient; Maintainer for x2goclient is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goclient is src:x2goclient.

Reported by: Orion Poplawski <orion@cora.nwra.com>

Date: Tue, 29 Nov 2016 16:20:01 UTC

Severity: normal

Tags: pending

Merged with 1112

Found in version 4.0.5.2

Fixed in version 4.1.1.0

Done: X2Go Release Manager X2Go Release Manager <git-admin@x2go.org>

Bug is archived. No further changes may be made.

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.x2go.org
Subject: Bug#1119: Fwd: [Bug 1399281] [abrt] x2goclient: privatekey_from_file(): x2goclient killed by SIGSEGV
Reply-To: Mihai Moldovan <ionic@ionic.de>, 1119@bugs.x2go.org
Resent-From: Mihai Moldovan <ionic@ionic.de>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Sun, 26 Feb 2017 05:40:02 +0000
Resent-Message-ID: <handler.1119.B1119.148808730427932@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: followup 1119
X-X2Go-PR-Package: x2goclient
X-X2Go-PR-Keywords: 
Received: via spool by 1119-submit@bugs.x2go.org id=B1119.148808730427932
          (code B ref 1119); Sun, 26 Feb 2017 05:40:02 +0000
Received: (at 1119) by bugs.x2go.org; 26 Feb 2017 05:35:04 +0000
X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=-2.0 required=3.0 tests=BAYES_00,DKIM_SIGNED,
	DKIM_VALID,DKIM_VALID_AU,SPF_HELO_PASS,URIBL_BLOCKED autolearn=ham
	version=3.3.2
Received: from localhost (localhost [127.0.0.1])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id EE18B5DBE3
	for <1119@bugs.x2go.org>; Sun, 26 Feb 2017 06:35:01 +0100 (CET)
X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de
Received: from ymir.das-netzwerkteam.de ([127.0.0.1])
	by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id hOHeSnhr15Yk for <1119@bugs.x2go.org>;
	Sun, 26 Feb 2017 06:34:55 +0100 (CET)
Received: from Root24.de (powered.by.root24.eu [5.135.3.88])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id DD8EB5DBE2
	for <1119@bugs.x2go.org>; Sun, 26 Feb 2017 06:34:54 +0100 (CET)
Received: from nopileos.local (178.162.222.41.adsl.inet-telecom.org [178.162.222.41])
	by mail.ionic.de (Postfix) with ESMTPSA id 6ABF74F00145;
	Sun, 26 Feb 2017 06:34:54 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=ionic.de; s=default;
	t=1488087294; bh=c1dfVH9qSJouZHUuCsOzNVhMQZ3GzFqnGGn54eE/jSk=;
	h=Subject:To:References:From:Date:In-Reply-To:From;
	b=N6grW0Pq+7ttNw8rSNlwpcaftN6bv8lFzXi5Nrx99rIzd8yHwjRXlzE7Os0+9IxMJ
	 CeGTVarOAVJV23EAJ+KvC2RNc9z+OHXzXZ5bwv+GwxaE783bMirrQf3SnQujzm2BdX
	 kzKEw0tDh2xMJ0GYNU5oT4th2Kc+P6dC1x0wv+So=
To: Orion Poplawski <orion@cora.nwra.com>, 1119@bugs.x2go.org
References: <bug-1399281-140047-h6DMaBc5lP@bugzilla.redhat.com>
 <8a1b63ae-5931-24c8-40c2-cfc3cb2c156b@cora.nwra.com>
From: Mihai Moldovan <ionic@ionic.de>
Message-ID: <2a3be11d-44e9-1e82-8027-6ff1c7715079@ionic.de>
Date: Sun, 26 Feb 2017 06:34:51 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0)
 Gecko/20100101 Thunderbird/45.7.1
MIME-Version: 1.0
In-Reply-To: <8a1b63ae-5931-24c8-40c2-cfc3cb2c156b@cora.nwra.com>
Content-Type: multipart/signed; micalg=pgp-sha512;
 protocol="application/pgp-signature";
 boundary="r5otwfgHfbMEj6kAcmRICNc61OGRLk9bv"
[Message part 1 (text/plain, inline)]
On 29.11.2016 05:16 PM, Orion Poplawski wrote:
> https://bugzilla.redhat.com/show_bug.cgi?id=1399281
> 
> --- Comment #17 from Andreas Schneider <asn@redhat.com> ---
> Please open a bug for x2goclient upstream to use the new PKI API of libssh and
> not outdated functions.
> 
> http://api.libssh.org/stable/group__libssh__pki.html#ga1c8f84137606b1585006302499100ee0
> 

Thanks. I'll take a stab at that probably some time next week.

Can't see the RedHat bug report - permission denied.

If possible please relay to Andreas that I wasn't aware these functions were
deprecated, because they aren't marked as deprecated in legacy.h. He'll probably
want to add the SSH_DEPRECATED macro.

If I'm not mistaken though, these are now wrappers around the new PKI functions.
It's not checking correctly for SSH_EOF, though, only for SSH_ERROR.


I've ported X2Go Client to use non-deprecated versions in the current master
branch some time ago, so the channel_* functions won't be used anymore with
4.1.0.1+, whenever that's released.



Mihai

[signature.asc (application/pgp-signature, attachment)]

Send a report that this bug log contains spam.


X2Go Developers <owner@bugs.x2go.org>. Last modified: Sun Nov 24 04:16:47 2024; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.